0 penilaian0% menganggap dokumen ini bermanfaat (0 suara)
43 tayangan3 halaman
Our innovation and personal information are
passes through air in wireless network and
their secrecy can be preserved by using any one
of the encryption method. Nowadays mobile plays
a vital role in passing messages and pictures.
New operating systems and functions were
introduced in order to handle mobile
operations due to restrictions on mobile like
storage capacity, size of mobile, availability of
tower, etc… This article explains the concepts
of standard encryption and decryption methods,
how the non-standard encryption/decryption
methods used effectively to maintain secrecy, how
to convert mathematical symbol into secret form
in a quick manner, appearance of converted
encrypted form of mathematical figures and
embedding conversion and draw function by
considering restriction on mobility.
Judul Asli
Embedding a Non-Standard Encryption/Decryption Method with
Mathematical Draw Function to Meet Challenges in Mobility
Our innovation and personal information are
passes through air in wireless network and
their secrecy can be preserved by using any one
of the encryption method. Nowadays mobile plays
a vital role in passing messages and pictures.
New operating systems and functions were
introduced in order to handle mobile
operations due to restrictions on mobile like
storage capacity, size of mobile, availability of
tower, etc… This article explains the concepts
of standard encryption and decryption methods,
how the non-standard encryption/decryption
methods used effectively to maintain secrecy, how
to convert mathematical symbol into secret form
in a quick manner, appearance of converted
encrypted form of mathematical figures and
embedding conversion and draw function by
considering restriction on mobility.
Our innovation and personal information are
passes through air in wireless network and
their secrecy can be preserved by using any one
of the encryption method. Nowadays mobile plays
a vital role in passing messages and pictures.
New operating systems and functions were
introduced in order to handle mobile
operations due to restrictions on mobile like
storage capacity, size of mobile, availability of
tower, etc… This article explains the concepts
of standard encryption and decryption methods,
how the non-standard encryption/decryption
methods used effectively to maintain secrecy, how
to convert mathematical symbol into secret form
in a quick manner, appearance of converted
encrypted form of mathematical figures and
embedding conversion and draw function by
considering restriction on mobility.
Embedding a Non-Standard Encryption/Decryption Method with Mathematical Draw Function to Meet Challenges in Mobility
S. Lakshmi Priya 1 R.Lawrance 2
1. Scholar of Karpagam University, Computer Science Department, Coimbatore. 2. Director, Department of MCA, Ayya Nadar Janaki Ammal College, Sivakasi. ==================================================================== Abstract Our innovation and personal information are passes through air in wireless network and their secrecy can be preserved by using any one of the encryption method. Nowadays mobile plays a vital role in passing messages and pictures. New operating systems and functions were introduced in order to handle mobile operations due to restrictions on mobile like storage capacity, size of mobile, availability of tower, etc This article explains the concepts of standard encryption and decryption methods, how the non-standard encryption/decryption methods used effectively to maintain secrecy, how to convert mathematical symbol into secret form in a quick manner, appearance of converted encrypted form of mathematical figures and embedding conversion and draw function by considering restriction on mobility.
Keywords Challenges in Mobile, Encryption, Embedding, Non-standard Encryption & Security in Mobile
1. Introduction Cryptography allows the sender and receiver to exchange the secret messages so that a third party cant intercept and read the data. During early days through satellite dish, anyone can watch whatever was being shown by satellite television. In order to make the channels as paid one, not only for cable subscribers and also for satellite dish owners, Videocipher/Videocipher II system was introduced to encrypt video signals.
Videocipher convert the video signal into digital form, encrypt it, and send the data over the satellite. For the paid satellite dish owner, the Videocipher box in their end would convert the signal and return it to its original, useful form. This encryption and its original form uses key for invert operation. Now there are many standard and non-standard encryption techniques are available.
2. Related Work 2.1 Tradition Cryptography System Cryptography means secret writing. An interceptor/intruder/adversary can make the following threats:
Cryptography is the fundamental technique to counter these threats because the outsider does not understand the meaning of messages. A cryptosystem is a 5 tuple (E,D,M,K,C), where M is the set of plaintexts, K is the set of keys, C is the set of ciphertexts, : KC is the set of encipher (encryption) functions, and D: C KM is the set of deciphering (decryption) functions. Plaintext M: set of messages in original form ; Ciphertext C: set of messages in encrypted form.
Encryption is the process of encoding a message so that its meaning is not obvious. It provides confidentiality. Principle of encryption is very hard to find out the message without knowing the key and very easy to find out the message knowing the key. Decryption is the process of decoding an encrypted message to its original form.
Encryption methods usually converts the given text and picture into encrypted text/image. This encrypted text/image can be converted again into its original form using decryption method (vice versa of encryption method). Standard method of encryption uses keys to encrypt message. The key which is used with encryption method is called as secret key. The size of the key determines strength of secret. When the size of the key is International Journal of Computer Trends and Technology (IJCTT) volume 9 number 5 Mar 2014
high it takes long time for conversion process but more secured. For small size of the key the result will be less secured and less time for conversion. So selection of key will be depends on strength of secrecy required and how long it is obligatory. If the time period required for the secrecy is less, then we can adopt small size of key. If it is more, then it is advisable to select lengthy key to strengthen the secrecy without considering the time period taken for conversion process. Cryptosystem falls into two major categories.
Symmetric cryptosystems are classical cryptosystems
M =D(K, E(K, M)) The encryption key and decryption key are the same
Asymmetric cryptosystem
M =D(Kd, E(Ke, M)) - Kd is the decryption key and Ke is the encryption key and Kd Ke
3. Research Work 3.1. Mandatory of encryption Nowadays the transfer of message became highly mandatory from low to highly sophisticated people. This happens through increases of advanced technologies of communication media from high to low cost. Maintaining secrecy is also one of major task in the business world due to more competiveness. Tender quotes are best example where secrecy plays a vital role. When passing these types of secret messages through email or SMS requires fire walls or encryption method. Mostly many of the intruders make a hole in fire walls to theft the secret messages. So it is advisable to use the encryption method to maintain secrecy in secret messages. We can use standard or non-standard encryption methods depends on the period of secrecy, type of message like military/ordinary, type of communication media, size of the message etc
3.2. Challenges in mobility There are wide range of operation systems for mobile communication like iOS(Apple), Android, Windows Phone 7, Blackberry, Symbian(Nokia) and webOS(Palm) etc.. Most of these operating systems lack fundamental requirements such as backup, version control & security. In addition, device vendors are competing aggressively with one another, introducing new versions of their mobiles.
Mobile technology is growing day by day and it requires skill to develop and support mobile applications. Many IT companies build their initial development with quite modest goals. Only limited operating systems and software were used in mobile phones due to their restriction. The size and execution time plays a major role in mobile system. When selecting encryption method for conversion process care must be taken to avoid delay process in mobile because the user may get irritate. The standard methods like DES, AES, TRIPLE DES etc.., takes more time because of the size of the key and more number of iterations to complicate the predication of original text. So these methods are not suitable for mobile system. We can adopt some other non- standard encryption method for conversion process because of the restrictions in mobile system.
3.3. Mathematical symbol conversion In research department the standard mathematical symbols like lines, arrow, square, triangle etc.., are used very often. If these symbols were considered as image then there are numerous pixels we have to contemplate to encrypt it. If we deliberate only the required pixels for the symbols like starting and ending points for a line, three pairs of points for a triangle etc.., then it will be easy to encrypt. That is when considering only the required points for encryption it will take less time for process and also requires less memory. For conversion use a non-standard encryption method which is suitable for small communication devices. Store sequence of pixels into an array and encrypt it.
3.4. Embedding conversion and drawing To draw mathematical symbols use conversion and draw functions. Firs read the points of mathematical symbols which are to be encrypted. Then convert these points into encrypted points. The decryption process converts the encrypted points into its original arguments. These points are used to draw the original symbols with using any one of the software. So embed draw function with decryption o draw the required mathematical symbols. Embedding software can be done through calling function inside the decryption method. International Journal of Computer Trends and Technology (IJCTT) volume 9 number 5 Mar 2014
Read the required points and convert into array Convert into encrypted points using non-standard encryption method
Steps required for embedding concepts in decryption
Use non-standard decryption method to decrypt the points and store into an array Call draw function to draw required mathematical symbol
4. Conclusion Traditional encryption methods can be used when there is a need for additional confidentiality. To sustain secrecy in mobile communication at a considerable faster rate we can use a non- standard encryption method due to restrictions in mobility. When there is a need to preserve the secret message for a short period, we can suggest embedding conversion with draw method which uses a non-standard encryption/decryption method to secure message with rapid speed. In future this concept can be implemented through any one of high level language and time stamp can be calculated.
References
Matt Bishop, Introduction to Computer Security, Addison- Wesley, 2004, ISBN: 0321247442 Matt Bishop, Computer Security: Art and Science, Addison- Wesley, 2002, ISBN: 0201440997 http://www.cio.co.uk/article/3306640/the-3- challenges-of-mobility/?pn=2 Howard Anton and Christ Rorres. Elementary Linear Algebra Application Version. 6th edition. J ohn Wiley & Sons, INC. Eisenberg, Murray. Hill Ciphers and Modular Linear Algebra. 3 Nov 1999 <http://www.math.umass.edu/~murray/Hillciph.pdf> Goulet, J ohn. Project #6 Cryptography. <http://www.prenhall.com/divisions/esm/app/ph- linear/kolman/html/proj6.html> "Fighting Computer Crime, A New Framework for Protecting Information," By Donn Parker and published by J ohn Wiley & Sons Information security awareness in UAE: A survey paper http://mathforum.org/library/drmath/view/52756.h tml http://email.about.com/od/freeemailreviews/tp/fre e_email.htm Doe, J ane. "How to Cite Information from an E-mail." E-mail to J oe Schmo. Nov.2003 Cryptography: A New Dimension in Computer Data Security--A Guide for the Design and implementation of secure systems